Preview

Computerized Identification System

Best Essays
Open Document
Open Document
4634 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computerized Identification System
CHAPTER 1
Introduction
A computerized identification system is used to verify the identity of a person. The data is stored in a database of a server. An identification card is a card giving identifying data about a person, as full name, address, age, and color of hair and eyes, and often containing a photograph: for use as identification at a place of employment, school, club, etc. There are various types of identification systems available and implemented across the globe. These are Biometric (finger, hand or iris recognition), Voice Identification, Optical Character Recognition (OCR), Radio-Frequency Identification, and Bar code. Each has its own capabilities but nevertheless, effective for identification purposes.
The bar-coded identification system was proposed to improve the existing identification system of the National College of Business and Arts, Fairview campus. The study is concerned on how the current identification procedures perform in the school grounds and how a bar-coded system may help improve it.
A bar code is a series of alternating dark and light stripes that are read by an optical scanner. The organization and width of the lines is determined by the bar code protocol selected. A barcode system is a network of hardware and software, consisting primarily of mobile computers, printers, handheld scanners, infrastructure, and supporting software. Barcode systems are used to automate data collection where hand recording is neither timely nor cost effective. Bar coding systems are not radio-frequency identification (RFID) systems even though the companies that provide barcode equipment will often also provide RFID equipment and many companies use both technologies as part of larger resource management systems.
There are lots of types of barcode, but the one commonly used all the time is called UPC, the Universal Product Code. Each digit is coded by two black and two white stripes. The stripes have widths of from 1 to 4 units, and the total

You May Also Find These Documents Helpful

  • Good Essays

    it 345 study guide final

    • 1027 Words
    • 5 Pages

    inter character gap serves as a break between the characters of a discrete encoded bar code… The width of the gaps should not be more than 4x dimensions…

    • 1027 Words
    • 5 Pages
    Good Essays
  • Better Essays

    References: Linear Symbol Technologies. (2008) LS2208 Barcode Scanner. (LS2208) [Computer Software]. Retrieved September 30, 2008, from: http://www.thebarcodewarehouse.co.uk/symbol-technologies.…

    • 4521 Words
    • 19 Pages
    Better Essays
  • Good Essays

    Technology affects communication capabilities of specialized databases in the criminal justice system by different systems such as Live Scan, Automated Finger Identification System that is also known as AFIS database, and Mobile data terminal. All these systems were created over the recent years and were made with many modern technological features.…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Nt1310 Unit 1 Assignment 1

    • 7711 Words
    • 31 Pages

    The system stores all the necessary information about the user. A new user is first registered to the system and the corresponding information is burned in the RFID tag. This RFID tag will then be accessible through the system. When a registered user comes to the entry point and puts his/her tag into the reader, the system checks whether he/she is a registered user or an imposter. If the user is registered, then the tab information is matched with the user information stored in system. The door is opened after the successful authentication and is closed automatically after a specific time interval. The check-in information is also stored in the database with the corresponding date and time. A log is also generated by the system according to the check-in information. Finally, this check-in information is stored in a central server along with the basic information of the…

    • 7711 Words
    • 31 Pages
    Better Essays
  • Better Essays

    According to Fishbowl, “with a powerful bar coding solution, you [the manufacturer] can easily track all your items and approach 100% accuracy in your inventory tracking” (Fishbowl, Barcoding Solution). Not only can 100% accuracy in inventory tracking be achieved, time can be saved as well as money by increasing the employee productivity, cutting down on the excess inventory, and freeing up capital. But what if something doesn’t have a bar code to scan? What kind of scanners can be used? Fishbowl has thought of these things. They have included in their software the option for the user to print a customized bar code and/or custom label to scan in addition to offering a few different types of scanners that have been tested and approved for use with the Fishbowl system (pictured to the left, right, and below) (Fishbowl, Barcode Software and Barcode Scanners). In order to use these scanners there are requirements that need to be met within the FM system (what the mobile devices work off of) (Fishbowl, Barcode Software and Barcode…

    • 3336 Words
    • 14 Pages
    Better Essays
  • Satisfactory Essays

    Codes—which are the most numerous—have five digits (with no decimals). Each code has a descriptor, which is a brief explanation of the procedure:…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric element, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristic code, the computer grants access. Examples of biometric devices include fingerprint readers and face recognition systems.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Qr Codes and Nursing

    • 1098 Words
    • 5 Pages

    Originally invented in 1994, by the Denso Wave Corporation in Japan, Quick response codes, or QR codes were intended to for the auto manufacturer Toyota as a means to track vehicles, as well as vehicle parts, during the manufacturing production stages of building their cars. The QR codes were designed to allow Toyota manufactures to identify parts by scanning a two dimensional barcode, or, QR code at high speed. Since its inception in 1994 QR codes have become one of the most popular types of barcode used in Japan. Used primarily through Smart phones, this technology quickly allows consumers to access information contained in the QR code. In recent years the QR barcodes have infiltrated the United States via consumer advertisers and packaging companies. QR codes can be found on direct mail from advertisers, billboards, buses, internet ads, and have even crossed boarders into the healthcare industry (Wikipedia, 2012). Even the Federal Government is adopting the use of QR codes to reduce the risks associated with mistaken personnel identification. The United States Department of Defense has also boosted identification (ID) security of employees by adopting smart ID cards, which are essentially QR codes. Instead of using the traditional ID card with employee photos, the Department of Defense has issued smart ID cards which act much like QR codes, however, they more are more expensive to produce, and require ongoing IT support. Although they are more expensive than a traditional ID card, The Smart ID cards allow for faster verification of personnel, and may ease some of the pressure on security officials who have to use their judgment based on an ID card flashed in their face. With one scan of the QR code, down to the minute, information can be displayed, which includes, authorizations for the employee, or their qualifications and, or credentials. The purpose of this communication is to explain the advantages and disadvantages of participating in a QR code pilot…

    • 1098 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Identification is the first of four steps of the security process. Any user that expects to gain access to a system is referred to as a supplicant, and the tool that every user who gains entry to the system is referred to as an Identifier. The identifier can have many different methods for identifying the supplicant. The…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric identifier, such as a fingerprint, into a code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristics code, the computer grants access. Example of biometric devices include fingerprint readers and face recognition systems.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    1973 also brought the introduction of the UPC barcode readers to the point of sale systems.…

    • 555 Words
    • 3 Pages
    Good Essays
  • Better Essays

    We Can but Should We?

    • 1340 Words
    • 6 Pages

    Quick Response codes, or QR codes, were developed by an automobile parts manufacturer in the 90's to track its parts. (Denso Wave Incorporated, 2010). They differ from regular bar codes in that they can represent up to over 4,000 alphanumeric characters as compared to only 20 numbers of the standard bar code. This allows the QR code to pack quite a punch in information for today's hi-tech computer junkies. So what does that mean to you and me? Bar codes are only lines that represent numbers. It has to be read in a very specific way in order for it to be read correctly. They also need to be created by a piece of software that needs to be purchased and read with a scanner. That makes them very limited in their use and difficult for the everyday user to create. Enter the QR code.…

    • 1340 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Once upon a time, way back when in the caveman era, caveman used drawings on walls to keep track of information and to communicate with each other in the clan of one 's life-span. Over time, man have improved and evolved in the way of keeping track of information and communicating with one another. Today, one finds himself more in an automated world than he did 25 years ago. When planning to purchase a computer, one must take in consideration all possibilities, options, and accessories that one could receive along with the computer. In this summary, we are going to examine some of the input, output, and storage devices along with speeds of a computer. You did a good job of getting the reader 's attention and giving the reader a "road map" to your paper.…

    • 1764 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Student

    • 353 Words
    • 2 Pages

    display of a barcode upon the forehead of a baby immediately identifies the baby as a…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Rfid Based Security System

    • 2569 Words
    • 11 Pages

    Our final year project is RFID based Attendance cum Security System. This idea came to my mind when I saw our lecturers taking the attendance of 100s of students very hardly. We thought we can integrate the RFID based Security System with attendance system as well. That what our final year project is doing.…

    • 2569 Words
    • 11 Pages
    Powerful Essays